Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks

Mobile Ad hoc Network is a set of self-governing nodes which communicate through wireless links. Dynamic topology MANETs makes routing a challenging task. Various routing protocols are there, but due to various fundamental characteristic open medium, changing topology, distributed collaboration and constrained capability, these protocols are tend to various types of security attacks. Black hole is one among them. In this attack, malicious node represents itself as having the shortest path to the destination but that path not even exists. In this paper, we aim to develop a routing protocol for detection and prevention of black hole attack by modifying AODV routing protocol. This protocol is able to detect and prevent the black hole attack. Simulation is done using NS-2, which shows the improvement in network performance.




References:
[1] S. Basagni, M. Conti, S. Giordano, I. Stojmenovi, “Mobile Ad Hoc
Networking”, IEEE Press and John Wiley & Sons, Inc., 2004.
[2] M.S. Corson and A. Ephremides, “A distributed routing Algorithm for
Mobile Wireless Network”, ACM J. Wireless Networks, 1(1), Jan. 1995.
[3] C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector
Routing,” Proc. 2nd IEEE Mobile Computer Systems and Applications,
1999, pp. 90–100.
[4] P.V.Jani, “Security within Ad-Hoc Networks”, Position Paper,
PAMPAS Workshop, Sept. 16/17 2002.
[5] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc
Network”, Master Thesi , Blekinge Institute of Technology Sweden,
22nd March 2007.
[6] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and
Countermeasures in Mobile Ad Hoc Networks”, Wireless Network
Security. On Signals and Communication Technology, Springer, New
York, 2009.
[7] Vishnu K and Amos J Paul, “Detection and Removal of Cooperative
Black/Gray hole attack in Mobile ADHOC Networks”, International
Journal of Computer Applications (0975 - 8887), 2010, Volume 1, No.
22, pp. 38-42.
[8] H. Deng, W. Li and D.P. Agrawal, "Routing security in wireless ad hoc
networks," Communications Magazine, IEEE, vol.40, no.10, October
2002, pp. 70- 75.
[9] Nidhi Gupta, Sanjoy Das, Khushal Singh, "A Comprehensive Survey
and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc
Network", World Academy of Science Engineering and Technology,
International Journal of Computer, Information Science and
Engineering, vol. 8, no. 1, 2014.
[10] M. Medadian, A. Mebadi, E. Shahri, "Combat with Black Hole attack in
AODV routing protocol", Communications (MICC), 2009 IEEE 9th
Malaysia International Conference on, vol., no., Dec.2009, pp.530-535,
15-17.
[11] B. Sun, Y. Guan, J. Chen, U.W. Pooch , “ Detecting Black-hole Attack
in Mobile Ad Hoc Networks”. 5th European Personal Mobile
Communications Conference, Glasgow, United Kingdom, 22-25 April
2003.
[12] S. Banerjee “Detection/Removal of Cooperative Black and Gray Hole
Attack in Mobile Ad-Hoc Networks” Proceedings of the World
Congress on Engineering and Computer Science 2008 WCECS 2008,
October 22 - 24, 2008, San Francisco, USA.
[13] P.C. Tsou, J. M. Chang, L, H. C. Chao, J. L. Chen , “ Developing a
BDSR Scheme to Avoid Black Hole Attack Based on Proactive and
Reactive Architecture in MANETs”, 13th International Conference on
Advanced Communication Technology, Phoenix Park, Korea, Feb.
2011, pp. 13-16.
[14] W. Saetang and S. Charoenpanyasak, “CAODV Free Blackhole Attack
in Ad Hoc Networks” Conference on Computer Networks and
Communication Systems, IPCSIT vol.35, 2012, pp. 63- 68.
[15] P. Agrawal, R. K. Ghosh, Sajal K. Das, Cooperative Black and Gray
Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd
international conference on Ubiquitous information management and
communication, Suwon, Korea, 2008, Pages 310-314.
[16] S. Indrasinghe, R. Pereira, J. Haggerty, “Conflict Free Address
Allocation Mechanism International for Mobile Ad Hoc Networks”, 21st
International Conference on Advanced Information Networking and
Applications Workshops (AINAW'07).
[17] M. Mohsin and R. Prakash,”IP Address Assignment in a mobile ad hoc
network”, The University of Texas at Dallas Richardson, TX Kaixin Xu,
Xiaoyan Hong, Mario Gerla Computer Science Department at UCLA,
Los Angeles, CA 90095 project under contract N00014-01-C-0016.
[18] The Network Simulator - NS-2
(http://www.isi.edu/nsnam/ns/build.html).